Analysis
-
max time kernel
208s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00272.7z
Resource
win7-20240903-en
General
-
Target
RNSM00272.7z
-
Size
5.2MB
-
MD5
eadcd360fb1a1daf696f61968aa8f432
-
SHA1
88af3355405ba550ee82b39041f5a81f63d74dda
-
SHA256
20b37ae125dc868f05fe28dad7206435d99baaf499f10ffa361bb071eeba1c02
-
SHA512
ae290cf8f0956f7693100f54154cf9b1291b18ea98ce6cd058c01b097e7d4ff3ffaaea85e40e3dcf7976145a05043e44644262a697f072351c38c311ab5d56b5
-
SSDEEP
98304:TFEVgOf8S8rW7u8o1Oc/Q7Ia23NbZZxkzG7dmzZQKV+bjii6Uj5VOW2WDvWvQjq9:TFuf8VrEu8oLGGkzS2QKVSjsUB2MOIO9
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_README_KSKUYX_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3C7F6036C3BAB654
http://kkd47eh4hdjshb5t.angortra.at/3C7F6036C3BAB654
http://ytrest84y5i456hghadefdsd.pontogrot.com/3C7F6036C3BAB654
http://xlowfznrg4wf7dli.ONION/3C7F6036C3BAB654
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 1692 mshta.exe 66 -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Updatedlogs.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions regsvr32.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys regsvr32.exe -
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral1/memory/2908-231-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2908-230-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 behavioral1/memory/2908-228-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 behavioral1/memory/2908-232-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2908-236-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2908-235-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2908-234-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2908-233-0x0000000001D10000-0x0000000001DD2000-memory.dmp modiloader_stage2 behavioral1/memory/2612-7737-0x0000000140000000-0x00000001405E8000-memory.dmp modiloader_stage2 -
Renames multiple (387) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "mshta javascript:ZcCO3eYX3I=\"z\";yr65=new%20ActiveXObject(\"WScript.Shell\");xJ1uTTFD=\"rkT2TkEcx\";NnP7r1=yr65.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\397d13d44c\\\\dc778891\");wZd7mOs1Qg=\"sYbwa2qRbT\";eval(NnP7r1);tAMXMYIv40=\"vJm8fuzfG8\";" regsvr32.exe -
Contacts a large (755) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kxssw.html mbhvrmroopgk.exe -
Executes dropped EXE 33 IoCs
pid Process 2200 HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe 1936 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 1940 Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe 1736 Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe 1204 Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe 1784 Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe 1740 Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe 1928 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 1124 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1616 Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe 1752 Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1596 Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe 952 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 884 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1644 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 2152 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 2908 Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe 2864 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 1980 mf.exe 2196 ef.exe 2324 svchost.exe 2244 Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe 2792 mbhvrmroopgk.exe 2164 Updatedlogs.exe 2220 Updatedlogs.exe 2000 mbhvrmroopgk.exe 2432 Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe 2596 Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe -
Loads dropped DLL 47 IoCs
pid Process 1936 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 1940 Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1124 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1928 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 1940 Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe 1940 Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 1980 mf.exe 1980 mf.exe 1980 mf.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 2196 ef.exe 2196 ef.exe 2196 ef.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 1752 Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe 1752 Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 2200 HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe 2164 Updatedlogs.exe 2164 Updatedlogs.exe 2164 Updatedlogs.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 2164 Updatedlogs.exe 2220 Updatedlogs.exe 2220 Updatedlogs.exe 2220 Updatedlogs.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe 708 2266-DailyOffers-1949-1.0.0.1045.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\B9oBmLC = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\szyokvv.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:CMhiIzj2=\"N2gPNFlND\";wg2=new%20ActiveXObject(\"WScript.Shell\");kqu4TuV=\"fQ\";laX5p=wg2.RegRead(\"HKLM\\\\software\\\\Wow6432Node\\\\397d13d44c\\\\dc778891\");KPV13lZL=\"WM0m2athgE\";eval(laX5p);vjXphTMe7=\"8BfnMYUcP3\";" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "mshta javascript:sL1Pukn=\"8YFE\";d1y0=new%20ActiveXObject(\"WScript.Shell\");Ga0wQCbao9=\"UKwFtny\";Oz3Ne3=d1y0.RegRead(\"HKCU\\\\software\\\\397d13d44c\\\\dc778891\");qqE3DZpr5j=\"E6tIV\";eval(Oz3Ne3);eGS3JqZi=\"19J086X\";" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Updatedlogs = "C:\\Users\\Admin\\AppData\\Roaming\\Updatedlogs\\Updatedlogs.exe" Updatedlogs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Updatedlogs = "C:\\Users\\Admin\\AppData\\Roaming\\Updatedlogs\\Updatedlogs.exe" Updatedlogs.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\gdegrfrrpghc = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mbhvrmroopgk.exe\"" mbhvrmroopgk.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir PersonalEdition Classic vbc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir PersonalEdition Classic vbc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Updatedlogs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Updatedlogs.exe -
pid Process 2956 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF4CA.bmp" Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\-INSTRUCTION.bmp" Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1928 set thread context of 952 1928 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 53 PID 1124 set thread context of 1680 1124 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 54 PID 1812 set thread context of 884 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 55 PID 1856 set thread context of 1644 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 56 PID 1736 set thread context of 2728 1736 Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe 59 PID 1260 set thread context of 2152 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 58 PID 2728 set thread context of 2724 2728 svchost.exe 60 PID 1596 set thread context of 2908 1596 Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe 63 PID 1936 set thread context of 2864 1936 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 68 PID 1740 set thread context of 2244 1740 Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe 80 PID 2164 set thread context of 2220 2164 Updatedlogs.exe 90 PID 2792 set thread context of 2000 2792 mbhvrmroopgk.exe 91 PID 2220 set thread context of 2760 2220 Updatedlogs.exe 92 PID 2220 set thread context of 2648 2220 Updatedlogs.exe 102 PID 2220 set thread context of 880 2220 Updatedlogs.exe 105 PID 2220 set thread context of 1872 2220 Updatedlogs.exe 109 PID 2220 set thread context of 772 2220 Updatedlogs.exe 112 -
resource yara_rule behavioral1/memory/952-161-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/952-160-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/952-164-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/952-163-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/952-157-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-240-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-242-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-243-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-244-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-245-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/952-480-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2864-612-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2760-877-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2760-887-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2648-1635-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2648-1629-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/880-2255-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/1872-3813-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/1872-3829-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral1/memory/880-4180-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/772-5264-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/772-5285-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\15.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked-loading.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg mbhvrmroopgk.exe File opened for modification C:\Program Files\Internet Explorer\images\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\203x8subpicture.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\slideShow.js mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\37.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\VERSION.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\currency.css mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_left.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_right.png mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_rest.png mbhvrmroopgk.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\Recovery+kxssw.png mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\Recovery+kxssw.html mbhvrmroopgk.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\Recovery+kxssw.txt mbhvrmroopgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\Recovery+kxssw.txt mbhvrmroopgk.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mbhvrmroopgk.exe Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe File opened for modification C:\Windows\mbhvrmroopgk.exe Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updatedlogs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2266-DailyOffers-1949-1.0.0.1045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbhvrmroopgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updatedlogs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbhvrmroopgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2416 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00070000000190c9-54.dat nsis_installer_1 behavioral1/files/0x00070000000190c9-54.dat nsis_installer_2 behavioral1/files/0x000300000000b4e5-254.dat nsis_installer_1 behavioral1/files/0x000300000000b4e5-254.dat nsis_installer_2 -
Kills process with taskkill 1 IoCs
pid Process 1552 taskkill.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\PowerCfg Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CD20FC1-A91D-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50C3F521-A91D-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000dcb1c2df7b9ec0848d172868d47765555c8585b9b4f4e9a796ecb92d16e44306000000000e80000000020000200000000009ddf44cd3a432592f40b185e7ca755aeb619570ca3c178ac3406b4d9016092000000054c386b60a1707934e36666afac92f5a2074dc2a29540d61661d7f837f07673540000000b855f6899f3b0eb13dffa4ab690c66812e9e9423d998c020c6da09e3439427f43938599ccb2f708b215c8438c7eb7c0129b81b6940b4de4cc37e94e97a67a01a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fc5e112a3ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 mbhvrmroopgk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 mbhvrmroopgk.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2912 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2416 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
pid Process 2200 HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe 1936 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 1940 Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe 1740 Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe 1736 Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe 1616 Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe 1204 Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe 1752 Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe 1784 Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1928 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 1596 Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe 1124 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 952 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 952 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2120 7zFM.exe 2612 taskmgr.exe -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 1928 Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe 1124 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe 1812 Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe 1856 HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe 1736 Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe 1260 HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe 1936 HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe 2956 powershell.exe 2956 powershell.exe 2956 powershell.exe 1772 regsvr32.exe 1772 regsvr32.exe 1772 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2000 mbhvrmroopgk.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeRestorePrivilege 2120 7zFM.exe Token: 35 2120 7zFM.exe Token: SeSecurityPrivilege 2120 7zFM.exe Token: SeDebugPrivilege 2696 taskmgr.exe Token: SeShutdownPrivilege 1736 Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe Token: SeShutdownPrivilege 1680 Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2244 Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: SeDebugPrivilege 2200 HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe Token: SeDebugPrivilege 2164 Updatedlogs.exe Token: SeDebugPrivilege 2000 mbhvrmroopgk.exe Token: SeDebugPrivilege 2760 vbc.exe Token: SeIncreaseQuotaPrivilege 2424 WMIC.exe Token: SeSecurityPrivilege 2424 WMIC.exe Token: SeTakeOwnershipPrivilege 2424 WMIC.exe Token: SeLoadDriverPrivilege 2424 WMIC.exe Token: SeSystemProfilePrivilege 2424 WMIC.exe Token: SeSystemtimePrivilege 2424 WMIC.exe Token: SeProfSingleProcessPrivilege 2424 WMIC.exe Token: SeIncBasePriorityPrivilege 2424 WMIC.exe Token: SeCreatePagefilePrivilege 2424 WMIC.exe Token: SeBackupPrivilege 2424 WMIC.exe Token: SeRestorePrivilege 2424 WMIC.exe Token: SeShutdownPrivilege 2424 WMIC.exe Token: SeDebugPrivilege 2424 WMIC.exe Token: SeSystemEnvironmentPrivilege 2424 WMIC.exe Token: SeRemoteShutdownPrivilege 2424 WMIC.exe Token: SeUndockPrivilege 2424 WMIC.exe Token: SeManageVolumePrivilege 2424 WMIC.exe Token: 33 2424 WMIC.exe Token: 34 2424 WMIC.exe Token: 35 2424 WMIC.exe Token: SeDebugPrivilege 1552 taskkill.exe Token: SeDebugPrivilege 2648 vbc.exe Token: SeDebugPrivilege 880 vbc.exe Token: SeDebugPrivilege 1872 vbc.exe Token: SeDebugPrivilege 772 vbc.exe Token: SeIncreaseQuotaPrivilege 1804 WMIC.exe Token: SeSecurityPrivilege 1804 WMIC.exe Token: SeTakeOwnershipPrivilege 1804 WMIC.exe Token: SeLoadDriverPrivilege 1804 WMIC.exe Token: SeSystemProfilePrivilege 1804 WMIC.exe Token: SeSystemtimePrivilege 1804 WMIC.exe Token: SeProfSingleProcessPrivilege 1804 WMIC.exe Token: SeIncBasePriorityPrivilege 1804 WMIC.exe Token: SeCreatePagefilePrivilege 1804 WMIC.exe Token: SeBackupPrivilege 1804 WMIC.exe Token: SeRestorePrivilege 1804 WMIC.exe Token: SeShutdownPrivilege 1804 WMIC.exe Token: SeDebugPrivilege 1804 WMIC.exe Token: SeSystemEnvironmentPrivilege 1804 WMIC.exe Token: SeRemoteShutdownPrivilege 1804 WMIC.exe Token: SeUndockPrivilege 1804 WMIC.exe Token: SeManageVolumePrivilege 1804 WMIC.exe Token: 33 1804 WMIC.exe Token: 34 1804 WMIC.exe Token: 35 1804 WMIC.exe Token: SeDebugPrivilege 2612 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2120 7zFM.exe 2120 7zFM.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 1784 Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe 2696 taskmgr.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1596 Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe 2220 Updatedlogs.exe 2436 mshta.exe 2436 mshta.exe 2688 iexplore.exe 2688 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 1952 iexplore.exe 1952 iexplore.exe 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2200 2616 cmd.exe 36 PID 2616 wrote to memory of 2200 2616 cmd.exe 36 PID 2616 wrote to memory of 2200 2616 cmd.exe 36 PID 2616 wrote to memory of 2200 2616 cmd.exe 36 PID 2616 wrote to memory of 1936 2616 cmd.exe 37 PID 2616 wrote to memory of 1936 2616 cmd.exe 37 PID 2616 wrote to memory of 1936 2616 cmd.exe 37 PID 2616 wrote to memory of 1936 2616 cmd.exe 37 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1856 2616 cmd.exe 38 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1260 2616 cmd.exe 39 PID 2616 wrote to memory of 1940 2616 cmd.exe 40 PID 2616 wrote to memory of 1940 2616 cmd.exe 40 PID 2616 wrote to memory of 1940 2616 cmd.exe 40 PID 2616 wrote to memory of 1940 2616 cmd.exe 40 PID 2616 wrote to memory of 1740 2616 cmd.exe 41 PID 2616 wrote to memory of 1740 2616 cmd.exe 41 PID 2616 wrote to memory of 1740 2616 cmd.exe 41 PID 2616 wrote to memory of 1740 2616 cmd.exe 41 PID 2616 wrote to memory of 1736 2616 cmd.exe 42 PID 2616 wrote to memory of 1736 2616 cmd.exe 42 PID 2616 wrote to memory of 1736 2616 cmd.exe 42 PID 2616 wrote to memory of 1736 2616 cmd.exe 42 PID 2616 wrote to memory of 1616 2616 cmd.exe 43 PID 2616 wrote to memory of 1616 2616 cmd.exe 43 PID 2616 wrote to memory of 1616 2616 cmd.exe 43 PID 2616 wrote to memory of 1616 2616 cmd.exe 43 PID 2616 wrote to memory of 1204 2616 cmd.exe 44 PID 2616 wrote to memory of 1204 2616 cmd.exe 44 PID 2616 wrote to memory of 1204 2616 cmd.exe 44 PID 2616 wrote to memory of 1204 2616 cmd.exe 44 PID 2616 wrote to memory of 1752 2616 cmd.exe 45 PID 2616 wrote to memory of 1752 2616 cmd.exe 45 PID 2616 wrote to memory of 1752 2616 cmd.exe 45 PID 2616 wrote to memory of 1752 2616 cmd.exe 45 PID 2616 wrote to memory of 1784 2616 cmd.exe 46 PID 2616 wrote to memory of 1784 2616 cmd.exe 46 PID 2616 wrote to memory of 1784 2616 cmd.exe 46 PID 2616 wrote to memory of 1784 2616 cmd.exe 46 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1812 2616 cmd.exe 47 PID 2616 wrote to memory of 1928 2616 cmd.exe 48 PID 2616 wrote to memory of 1928 2616 cmd.exe 48 PID 2616 wrote to memory of 1928 2616 cmd.exe 48 PID 2616 wrote to memory of 1928 2616 cmd.exe 48 PID 2616 wrote to memory of 1596 2616 cmd.exe 49 PID 2616 wrote to memory of 1596 2616 cmd.exe 49 PID 2616 wrote to memory of 1596 2616 cmd.exe 49 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Updatedlogs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mbhvrmroopgk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mbhvrmroopgk.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00272.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2120
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2164 -
C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\EuUHY.txt"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\aTKJG.txt"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\zXyGPPyF.txt"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\aEBdKflgy.txt"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\XeveW.txt"5⤵
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
-
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeHEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1936 -
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exeHEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeHEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1856 -
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeHEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exeHEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1260 -
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exeHEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys82F5.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exeTrojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\nso601B.tmp\2266-DailyOffers-1949-1.0.0.1045.exe"C:\Users\Admin\AppData\Local\Temp\nso601B.tmp\2266-DailyOffers-1949-1.0.0.1045.exe" /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:708 -
C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\mf.exeC:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\inetc.dll"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\ef.exeC:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\inetc.dll" -19494⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exeTrojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1740 -
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exeTrojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\mbhvrmroopgk.exeC:\Windows\mbhvrmroopgk.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\mbhvrmroopgk.exeC:\Windows\mbhvrmroopgk.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2000 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2912
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM6⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:27⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\MBHVRM~1.EXE6⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00272\TROJAN~2.EXE4⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exeTrojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exeTrojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1616
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exeTrojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1204
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exeTrojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\system32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysD8E2.tmp"3⤵PID:1736
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exeTrojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
PID:1784
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exeTrojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1812 -
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exeTrojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:884 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\-INSTRUCTION.html4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys3A62.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exeTrojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1928 -
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exeTrojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exeTrojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe"C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exeTrojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1124 -
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exeTrojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_6LU8_.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1052
-
C:\Windows\system32\taskkill.exetaskkill /f /im "Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2416
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:NnxrCN3="tZljD6W5";K8I=new%20ActiveXObject("WScript.Shell");tQbeT9OL9="hC";RV7Yx=K8I.RegRead("HKLM\\software\\Wow6432Node\\Vc8Othhops\\EPo8cL");c7aBwef="gFCwXQG";eval(RV7Yx);Zru3zfXLT="c1cl6oB8cJ";1⤵
- Process spawned unexpected child process
PID:832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:cjhvut2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Adds policy Run key to start application
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:1772 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1760
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"1⤵
- Executes dropped EXE
PID:2432
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"1⤵
- Executes dropped EXE
PID:2596
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:2968
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:2968
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
File and Directory Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1Software Discovery
2Security Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5145b78bc431f7c7cfb146e8923b30f89
SHA1787b2df62b800681882f02844593ea456aeb4b67
SHA2566d5705587ddae4c3d6c73d1d583d4c18c616ae97812c44e0036c78631f914c4c
SHA512eabbc2e65a98cab824a1271aceb6a8dd8ec1a3f0490ff033b11c5e55533a459e453acd47aba1661226a7f7822e5fc3affdb2420ebfb3024ddce8c635bbdf53e0
-
Filesize
63KB
MD5bc8ceae4c80703f71b18dc949c447a82
SHA1f004e2c374832e791156e8b27029c75105c54a8f
SHA2569c80f6bbd0d1c302ef45d2b675572be2090db685a2f5ee07e6a5ff47d41157b3
SHA51285c02f5971d17f5d25ae6aec43fa1a2e3ef666905a7ea9e8daffa7e7371bc0aae09c3b64f9e52b3e8a497ea041bd1b03ef82ed6292f105e91cdd9d84c39bbb14
-
Filesize
1KB
MD5db1932f7d0f41b6fc727c2a05e419fd3
SHA143558e4d34b8ef531cfa447456dc050fb0bede11
SHA256bf306af3c9d174b6be2974bdbbe87f06b03e921fef3a3184015995ab481c3ad7
SHA512cbbde416ca167b2c1f9338889aefb353f67786771c74766de9d253d601cdf7eae5f7b50eab457cb27382a4347e32dc01fd40926df38b7b01767e07490de56e1e
-
Filesize
66KB
MD5173c6ee5b1bafd7bc5793b1c2a40e086
SHA1f3c3bff2b6180c469728b2465f71d5fc4d02948f
SHA256a4217e33cf82df137d5aacfc2ae151985e9f486a589da94cd0ca75eecfa0cbfe
SHA5127e936ae2b653f70c7e27f600d4896c6158f5156d0961c85fd7959d914fe5866bf5dfba505d558b7e962513ef74ef208a0dd75ef15eb77baa8886b88209033482
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD550ebe08b9611aa345cd01ad6e8718b94
SHA164000931d8a670bff623fd3a6fb477f61bf66ca4
SHA256d7f8f754e4c8660ff35cd05b37c7ea8a423bb0ebc071f85a4e884ec3ccaf9030
SHA51293973e49506e077d511ef483ad96f869833d9f85a55d72e9b085d01f96cbbf63c146bab867dc1ad522c0abe4ecc89ed482890eeba5377b6e9caeb471c50e3543
-
Filesize
109KB
MD55703fab7e03095cc0157dfe9a26e5332
SHA17f0d896089304d1ef1a73c4dffdf445c50f7e7cb
SHA2560e9228065717b145c8e96b6c8c9f5752d2155f7d5cc9e465e553730be024608f
SHA5129016a58fb43996a9db1b7db152a646bec022ce542f77118261aa4b81e7df40e1bd722199258284229081c35a5e28d9205d92a18891fe261998e2c10212922819
-
Filesize
173KB
MD54839cc0c454f842cdcc7fd841f3a94a6
SHA19bd47ab1d18ce6335196f4bc5c775d245fe04ead
SHA256fb0c6dc5d5cea5890611eae54d6f0732b10a6c8b0d6706e1781192f0e9fc1ae0
SHA512c9dce63a6fa1b5b16cbd4baace23ba158367319323e41ca41448453dfb80321fe4b3639f1c178a12c482d9f56c5b957351fe1df3a0387aea220671ff41110151
-
Filesize
24B
MD52add52d9a5e6dc1b0c71bff454523e51
SHA1e5f8ff2791465c52ba19107c4f788e2bdfbd9d23
SHA256788459887c4fa8f2753fcb968c69d4618a71ce57d9491a4e44248e0598440b67
SHA5128ca0cc14548d70d46f4b4a6c0e8507d395b5450c4b6f4e3a2008f570edf03b506934c6ebd30061ee1faee5c4fc5aa66254fcdb40b0c375a544b806790dd55a55
-
Filesize
12KB
MD5a072c09cc9c39a17acba61b93992ba85
SHA17f74e3c869dd815b36bf2c940704d3eabb77fd52
SHA25654b3f7a84bb73b1940fb24590dda9f960bde6fd07522e0afef867d47e8806a08
SHA512ed9a6f45d941938441ba6a4a00ae2f6d3adea8ae03de1563ec47b8775db9e7b50c0c91b496040a2f712114ff9140f93b86a2fdae80ec843c5d41afd68d682ea0
-
Filesize
84KB
MD5d4bc9da0b5fb24ad60dbb7efadd0ac01
SHA11394bfe5f5a21ce607c9e4f7a43d50ba38fc3503
SHA2560d4a5b1f9bea03bb2d53e22ff69014ea92c892326a9f6a51349e9c7f3284197f
SHA5120d66d3892eed90ccdd8cf8b563cf0bdf20eb5963032d9e81d29342b92ccb7c3f60d0003e923139ab29ea480df5b39b320eb9bf1db15080c45d1c4556099b3a1b
-
Filesize
11KB
MD56182ca2105f6c66cc28f76d3e744fd68
SHA1c8adbfd9c83dc373ec66be0ab8a3732782ae6d81
SHA256756cb93ee163e521f00eb1b50b9a051ef068b87b96a7938db5ae3e273f53672c
SHA5121c07d84f9a89112737e864a73f16e2142a5d14cef1f8254860aa629c162ed90b4f4fd634c48c8d5c96950f30dfc1f6fb88bb97cad2f2a90f763be848ff5da3e3
-
Filesize
8KB
MD5b1b7a272c210cb6726917eb1711837bc
SHA131c6895894395050698e193819b73f042f4d8712
SHA25694afe98c15517a5e27db0e3320c8f4fcee469fc270bf636dc0713295f5c585c1
SHA5121872f62910e2aa9cdd66cf8cd797b8d4c3c79f92a2b9a95800d972f31491784b8fa9933da9f42f47a1d4fa40c4cc64539325acbba995f9b125db6a133113a30f
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ef4d7b5d8137620268ea909fa422114c
SHA153a26db5f8ba92a778c17ed507ad02e673c60452
SHA25699c8edac26fc7eb151395fc605f57492310f1ce6ff5ee86b32dcc64236614bb4
SHA5129a419e13ba6a43f498ae057db4f93dea3ab33237b02f30f70fa892ba54f568f20efc31c607bb51239566d04be6b3f8d3c514bcbdafa941cfe6ac9ffab464df9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee009e8c348af44708c28616055d86dd
SHA191f675be49e62dd8580649e25cf77653ece19262
SHA256531d0187c3fdab0ed35e90b5c98d08f2e78de22f6fe0c431ec677fc422de8477
SHA5128aea22a37d6774d7abe7e04bad287050959c7619e742f4f97e9d3c93edad2d4141f5bc48ef74a7127e4f9c3f7999b8f721ca9bce678bc2526ad7869dd710e637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bd34bb87bd647b12ffa61ab7fa1778
SHA1ca924a5d88cbea3d5b40b5efb9ed505c827d5990
SHA256b9b52dc7296468feee7fe251e7b9c8bc0e9ef4a117aef81805472a3d18fae1e0
SHA512568556c07cd533d4f9754171f4a0a305c047c972200d656dde6302e077acf057f6b90284e9b9139cd8e124108231539e6d6e1534577e614556d211d3380fa685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48514e5deac1c4298aa18c8629829d2
SHA164ec8b22b8118feda7e27a83997a5932b99dfa0b
SHA256f921a3acd9f1889e637c7f18dfed7e751888f4bbee34558689c594ecdc12a626
SHA512e916fae1f38111e80789e13a9ea7ada9726573ff4d58917731a2a77d03533a91fc282acd5ccd11e5a3d01a64195a72ef9526e90bddd693210b6e534c45328429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1353ea3759ba0ac1b75a09b64a86c84
SHA109fb766254f377123400264cec5ad0bf840c818f
SHA256fc88251d5f68de79a558f86209e694e87f10eb181b5a5b9c7f0a31638e9a74bd
SHA512adc6ed2299b514f90b6e5b1eba430369c3775b06271d4282def8a4f1c8cf4946f462c4274710518d7c0f137e625ae56a9f3576182c6435e71cb2f1ba004357f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8fbce5151ae38acbcb0e5d3be17724
SHA1da8d44d7991b2265247b2088c51256f642204055
SHA2568c61daa0c477a31a76f0b05af755267e35352cf1977ca503acd5a10a486a6878
SHA5129b3c081a2fe81459f6f15c65ea4ba1b4e4784bc9c8e28c19b208c97e4f6869680572f5a5f5f7389e2361093e1321d468883b3b808b16b8f09ba4cd9f0339f329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6507f21588be911e0016a996da2935
SHA18c474ae0c7711bf8b8144aa6559d9b7670716b81
SHA256bdd6efc2bfa442e14187ebb6a8df34bbe8d49354571e703b8346e58d23ba8d18
SHA512ce53dd943a5408b5142772c3e592935c2a266fbb718bc2312a693db9209778fa1b5cd204eb42a78eabebdbdefcf636caa71203f3091659984d87e6f202c3191b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aced61806e74ee036b6411000f73ab40
SHA145bd7929c1ca5cf91db0aeace3f6c010dd62e998
SHA2569d0daad90dab04f98778b40729d6df8a33bf6d357fca33a1dcb13919666d9bc3
SHA5127ccc356ca8ca7bf18ac08bffcdeba29d9913914cbd39fb68341b34a279518a88c42e0c9df0b2f2928e770a4de14dc05e59f5ab73a37fb104fe65f84eabc5aca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c360019a4d84a1a2eca6f987e95e790b
SHA1ff3c3e5e97bb584051e9483e103a0cb12f572216
SHA25673932e97b156dacd47eaa74ecafe3b9b0f3db5dfb65e1f48c9dd3d2157759875
SHA5125659ae9526242821e9e461de242ca0701caa99bb167f15aaa272845d39a93cf28a26d88fb601185ba152125af9339c87fa050c2e92841642a942c9626d1a0c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723189246c54dc27794af0382fabd630
SHA18e26f8e639a51f27e2562e3c055e798aae1d3704
SHA2567c4459073f244dfef6a620141816592ed8ba7ac02e6397a0371bf0d2472845e8
SHA512c08af2c53ec10427edf1f843ecade84151da881edb40b41a9489c6c7f206bc1efcec561e8e78dc3696b1e2c57094e11c84b079f925ec1dfc4fb2427e2f6618cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b0a4607710fde7776b83ddad008feb
SHA187d4196b1529d560e97d1c53b86818dd004e2c41
SHA256411f5235c7aad8da68d7381aca839c663948f820f0ce9deeb2a594c040abc3c6
SHA51273ddb6bae85519f320702ae14d1683f5e2b3a7a47b042b17d9ae8c9267f9f8158e9bf3aa18491e9e9c992d3f493004853175a6b5bd21ee2651ae6f6e4813f678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597af6c41741e76e5e4479b3c30c0c80f
SHA1a9adc3bc07f4de7749177fdd6922462b8489c636
SHA2567072ea31f7c2ec8d309b9e4f29043433b81cb7c086425f093678a296de02c6f2
SHA5128e07c474363a44d4a670ea53dddb07cca2ed99902d2bc7d9ca9f5c7ac3e23e015c4b67e40e9d43023a317cfe52f1c8d8faa4d4e9655994c2047e52814c0beacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58226a34afce298171a0cffc77e2d11bd
SHA159b2a3268bcb7972f60e9c0201f186c2c372e764
SHA256b717dc7c451e15107491ac3a5a1f9cea7f94dd18f2fd5fc4252d81daae56f697
SHA512935d61781c8c6261f40dc9c9ff663f8e8ebd862c1fac1a06d156154d9a445920921531b8ae627f66d57fa07803d44db2f3498667c7f36e1df44b74bd06986ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee99b1cc9ffcb77aef5d97b9dce84873
SHA1123ec72927338ef0827adb91725af88cff412141
SHA256ca717315ac3ea8bf8e76164c1058f2eb9f364f14a61cc1b2eb60e9cea354552f
SHA5124188592994977c204342633b5806dac9aa5e40306315d43cc8f4e730cc2e3f851785c93664ecc2b8df30324a707fadfe0d74f90a2e06d2c85789153b651d3c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161b4e600598c5bda33bee0b33a20e4b
SHA1a95fc19359a98179adcc2faaba064f3b7fa215ae
SHA2561875d8d8ea9222a1cb6e76f9a8b37bb316b5b760d6c6f96a3dddd69ffe7ec1d7
SHA512a78ff675d1dce938c5ca35320329545a000023c3d96b040b944d64030759f615060910780da2ade19e917da63d3e476afe0bbed8f8f17b547eb63d7b4d2ac88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a566c0ef48b84fe720d5749dda0d9f20
SHA1a19c4d1713bc0aa2960a86dc44d6845213de6e71
SHA256da065468233c4069c182a0c11a1c921e4bffbb85ba119398b381cf76be500255
SHA5120fc794d4cce646bc915fdd5252bcfe22249bc63c4a22139267021128aa4e59cd519d031d7b777007a5abbbb2addfb7740a02c9635829bb757915c95e2cc2bdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53131afb67f6892c07118fe7fd95d4aac
SHA17bcbb085aee63a4acf86dec721b948e7e209117d
SHA2569d88958ad1d90a5a27abbbab0b0067a1c3b19126dd38996e198d503b4ea3ecb5
SHA512a47a193ff0c5d81c4de336221a590dab7dbad74c7153f811aec0e5be13d9932ade26442812aaadf9706da592d4c0bdec16453d4d3293dc4f5afbc324d3899d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590324f8e8bb922c5ee1c1901b584a4ee
SHA1217ef07c4f408f16fc7d6bd0c336c82f62fa4f0a
SHA2562aaeeab0207e0d3230a68a28c13d2bf9156567ae015c83b3072db5342fd38a2b
SHA5125bae4e2a4c2a0780f83eaca29e25307da6b21eb0a50943857a522389e1dbb8ff409217fab565fee8490ca15a7ec1228eb4c590ffc9907f0590d98c26d1530ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd4ca0bf0ec82bd52a45a250b5e02f5
SHA107dd930aeef5ba9919eb7f68bf71cf7e32d8a614
SHA256b16cba0940248eccd37709936c23ded9f243aa8cabb5876df35edf2cfeee5207
SHA512ab64be6f166391214b2e0bccd17de358b7a13b7d802da62872a361bca0b5646560ff1f7cbf406f246a929c1906effb2ea70ada42e129cab90c2c4d09b12a381e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f768ff35ff1810f14e4579fe005bcb6
SHA1802d6afa062e82a4e07231b34d114fb18b9ecb50
SHA2561fda1217a7be84c5ed4791432b8c78e5bcc410e549bb7150584ab34a1b25f2e7
SHA512e2f95a37788e4cb20c99404529dae9151f07047fa65b9e194e535111bd1c9bfc0e8a5917a21a2bf314b5b2d8544d3c4de6cd9601bb62ede4a75bb974319621a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5388666762f9dbe8441479f3974bf6d96
SHA10c3cb71914eae634861b49d5d4dd512e086334ef
SHA2569fb351416b3fd0e39f85731145759a24ba0722c51ed2f4e9a8316cca5660d931
SHA512838d6dbe49a30b8fb86a4d3858232be1d6bd51e120292d700fcd315ab538e39a684e17b4fc181f03802447dd6a337bab208f4f7b6a877ad6bebb832caccd47d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD5b8a00d99534bf83442b20b2474b767cf
SHA1505d3f6591db0f87a73a0ac820cc2eba5171cfff
SHA256cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6
SHA51275df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5
-
Filesize
36B
MD5b7cb86b65cd716cf88ab1704c36ba580
SHA1acef7ec1dca725036292c09d8e51e3441d5fd067
SHA2564cba76f6c0c0760078f3ed8991c068158bf0a922522ff73f1142bbbf6d0043c7
SHA512673418aeae6ccef547681d5469c85fa88abdc8013808ae4f098f6889a4cbe728ae2ca6c5dda074e23a8a72f84afa03929ee2cd720078222422e4c9a976c1a92b
-
Filesize
20KB
MD5d11f86e3cbc9197de84e2ee9e1198be0
SHA1c2c258a3f8af0ffeb2d7d5eb216ea194ba522742
SHA25698515c9e1c20d3cca284cc421737dd44f2a574be4f3ab33810b0ab436b1bec2b
SHA512d986560fa4fff2a491c94283e5cd0980810fa444457985e31d10194be732bfe1577a46f43aaef62cfe315e0a990f77b6f38b64f9aa5e96b31c3637d7f200d3d0
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe
Filesize1.4MB
MD5b26554dfcaad57d7e0464df224333f69
SHA1163214f9de404810f999002e916b97c0b9290518
SHA256d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d
SHA51233cecb0eab19be2902f8703b30c936a17270ccd89702ea66ef683fc50b8647980b20342697f9e63c270d7bbe1bdeabf638226fa3e2b4d263712cda3d1032b79c
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
Filesize906KB
MD5d2fdf1966b09fb6c527aa173adc85a43
SHA17686bc0b043a50986613f497bc25396489b610e4
SHA256d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65
SHA512fa0b3250b1f697b64cef65675b6e28a1b91393afdf4743e733cb19b9f227e8c792cbceb3bdbaeeb31bd3cbff3a5031d9e3427502788a2f6c60d29e1b98504915
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
Filesize193KB
MD5cbdd3513fc147102fb527ffe27a5fe07
SHA126e43ef70a8def73c2f11899a346fb7d7b88e557
SHA25606bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b
SHA51229dd30b16399557eaa3459dc67906db333bce017874d713bdb195c19f13b32c19a40fe4680b561ae716ad18d1f7a0f38871d057bb2fb86864bf3376aa399f01c
-
C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe
Filesize209KB
MD5e5bec5b56e1697dd5f9b94d8d1b34018
SHA11e3c9bf31aceb183c00d52a64b01932291588ccf
SHA256fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e
SHA512c1f52d391b095a5b3d80c2cc002c17939130c14ebcfb6f15de662dd1db49fe2033430fd2ce42451d3b628c891370d763b01cc174025be9dc17218ada21807fb0
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe
Filesize169KB
MD54f3f3a72570497c8414c07616545e7c7
SHA17d443bcc6d6253bc37a83500ebec7004428e8f6a
SHA256195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400
SHA5120330aff23eead70fc73e91f5595e3e950b487b11bcf48cc68d20670fcb1b2985f2820608998cf9fb845d2e08d824e010d5115bd5bd41cee75b847b73044f2c19
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe
Filesize384KB
MD5f55609019c52018369b5bddc77789f0f
SHA1e5ef19d703fca4ffdb8ba34b4731e6468caad0e1
SHA256c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e
SHA5127b19b82f1beca9be7c7525c35457d4c1bdfb5fd8b1ee4e080e30199f40ba1eb384f8eeec26a8dd0f4441974c1021f7a721389393f0200c0ab971dd48d0046e16
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe
Filesize306KB
MD5257f6844c90059daa5b48dae13daad5a
SHA1328b36ae6d543d1095e8deedcfed518f76385d29
SHA256e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6
SHA51256f68f19fe782c602b3be3110bb2bec26f9666041fe3a62941d4ec0b6ab8b4f80659084303ea892f3efb71d3de7eeeea8cc4454dfaf7a3257dd1b21499f3cb60
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe
Filesize115KB
MD5dd56b5d08cbf96ada08ae0515329f69f
SHA1390a692c6b05f59e73a3bb2e347b87622c05f929
SHA256b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d
SHA512ac306cc9197002982168f37c22174f3ce501cd852c97a685ee1518a702ada4d028d43b6eb43e4c1d66d53c89adbb42bbc4e66a2e417d4a3b3e7cf9eb5722ba5d
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe
Filesize244KB
MD5d73df47212bd3eb241ad3cebbf99c517
SHA12d306dd1e19678e6b24a47832c795fbfd903985a
SHA256a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442
SHA51205482790e281f626929bebe7861a88bd19685d1620295e051d4e6c56e21b6221f295164d3b50fb4f5e03fff98b4db471a05fd3541eded4c27f33beb19434b2e8
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe
Filesize180KB
MD51fd40a253bab50aed41c285e982fca9c
SHA13aa2e66f41b4611d5d5680bdb6625c4af19c542a
SHA25678e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a
SHA51262958fc7080aeec60858344860f74cd79e5bb0883039acb5416e0019764e95b1cc3760726b584996c75853105f45f81d87c96593eb98b556825e144edc0ba23a
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe
Filesize308KB
MD5e2982778434438cce87e6f43493d63ce
SHA11927c6f73714a3d06d379d2bc4693e7a970d5cea
SHA256100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48
SHA51247e51150b308109e218949cfe80160706bca06f2ba9b2ffac27e36db35a2ead729766afc09936d020cde20e0678a7c912d1ed59a6295fe9bcceb17f2b12b2248
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe
Filesize197KB
MD513cd5e781076a65125f7c6d4fa7340a1
SHA1a3031c42cc9fd24d10b51d3759b3691830cf211d
SHA2568da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592
SHA5122bf373553b82be78b3baceeceb7fb85504c230908d586fce1a911e30a4aecb6fd99d481d2430f6e70b172e7770a87658c953cdb0cbc4b38b076ed6ac58f7fe5e
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe
Filesize898KB
MD55fc442ad3bfd43d1c0af62208c7e23bd
SHA1db3daf52e5ab6a9463e93e251128aeed89201e0c
SHA2562d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326
SHA5120a6c3b34d4ee8e30b2829ff49d0479a806d961ae5fd865d4b4b574d435e657f9dd50e5a323bddfc358ede53622c248e737431d39b58faf2b3bfb5356fc6a01e3
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe
Filesize303KB
MD5384df03a9b54318bb286eae63f22b098
SHA1aaee89987d76e21ad4abdc2e7529a67d6b5d7031
SHA256f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c
SHA512ac8d3926b01557b9b29be5363de2630742ee13000c474c84e2e7a64ac191e352802baa757fb341207c4b4b3a15048755aa124c2f78773d912c2ad0b5f7ee9a73
-
C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe
Filesize302KB
MD570c96020538006a44c57d32348c19ded
SHA1264b1549365f410a69d3d183d45c2217e726345b
SHA256380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed
SHA512b8c57ba258dd232a936525dd38b0dce8b55c69cdbfe6b70c95ffeb217ad75fa02e674e13f3f2d6d47b1731b195e166918c9ce6a994d40959001051dddf1d4237
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
2KB
MD5224df7127c7ee69e67380eefc983a6ff
SHA1236c342c5bd1f71725534d097fcd8538dd95aa56
SHA2569ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965
SHA512c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
63KB
MD59782b8361b4810fd7d93be5c42b4cfd0
SHA1b2f0c2781544553e1b1bba70963e6e1b71d042aa
SHA256547321067788112bb93777ebf6b9d2dca578ce02be8aecbc946b7935a20fbb5d
SHA512c3566213b49cb7e88232fe57c079de0ae5f5ea6139fa996f4abf9e389d7616962d58a8fe7b56701a46f4214192dc8261f03bf6246a435af694ee9ff9df48ce6b
-
Filesize
21KB
MD592ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1d850013d582a62e502942f0dd282cc0c29c4310e
SHA2565520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
SHA512581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651
-
Filesize
6KB
MD5f9be9e9ed447e7650434a7e46431baea
SHA1574080e6bd862099bddbb4330d513ce0e2e9c506
SHA2565797ba15a18b8c713df62d4a630ddd81fefeeb01a87d65d486d829991a1edc83
SHA512c939476c27a49b1d7eac2657453fd3e1027af5125fd750897e9315b36a48851d43196022e48f0d2dd5de20be94d3f6ece09190ed6009c60d7fe35a8649499c1f
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706